Sciweavers

854 search results - page 57 / 171
» Using Simulation to Investigate Requirements Prioritization ...
Sort
View
ISCAPDCS
2004
15 years 11 days ago
An Open Digest-based Technique for Spam Detection
A promising anti-spam technique consists in collecting users opinions that given email messages are spam and using this collective judgment to block message propagation to other u...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
GLOBECOM
2007
IEEE
15 years 5 months ago
Sensing Workload Scheduling in Sensor Networks Using Divisible Load Theory
Abstract— This paper presents scheduling strategies for sensing workload in wireless sensor networks using Divisible Load Theory (DLT), which offers a tractable model and realist...
Xiaolin Li, Xinxin Liu, Hui Kang
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 5 months ago
Analysis of micro-behavior and bounded rationality in double auction markets using co-evolutionary GP
We investigate the dynamics of trader behaviors using a co-evolutionary genetic programming system to simulate a double-auction market. The objective of this study is twofold. Fir...
Shu-Heng Chen, Ren-Jie Zeng, Tina Yu
TCOM
2008
105views more  TCOM 2008»
14 years 11 months ago
High-rate diversity across time and frequency using linear dispersion
To improve performance of orthogonal frequency division multiplexing (OFDM) for fading channels, this paper proposes increasing frequency and time diversity using linear dispersion...
Jinsong Wu, Steven D. Blostein
WIMOB
2009
IEEE
15 years 5 months ago
Multipath Routing in MANETs Using Multiple Description Coding
—Routing in ad hoc networks is a well known issue. Most of the previous propositions to route data between two nodes aimed to define a path (sometimes several ones) on which pac...
Eddy Cizeron, Salima Hamma